Use Threat Research & MITRE ATT&CK to Turn Analysis into Action

Presented by

Dan Kaiser and Sally Vincent from LogRhythm Labs

About this talk

Looking to turn third-party threat research into actionable takeaways for your team? Dan Kaiser and Sally Vincent from LogRhythm Labs walk through their process for reviewing third party reports using the real-world example of Maze ransomware. They demonstrate how threat research can be truly useful in protecting your organization from the latest developments in cyberattacks. Discover how to: - Turn threat details into new monitoring and threat hunting techniques - Configure your security solution to incorporate those actionable takeaways - Use samples of Maze that have been reverse engineered to test your newly configured solution They also demonstrate how to map third-party threat reports to ATT&CK techniques that can be used to develop mitigation, detection and response actions including: - Initial Access - Execution - Persistence - Privilege Escalation - Discovery - Lateral Movement - Impact Save your seat to learn how to make the most of threat research.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (94)
Subscribers (8182)
Notice: LogRhythm APJ channel has moved! Please note that this channel will not be updated with new content from 31 December 2020. We invite you to our new and improved LogRhythm channel, which can be accessed here: At LogRhythm, we strive to provide our users and subscribers with the latest security tips & tricks available on-demand. Check out our latest talk: How to build an effective security program with limited resources: